<div dir="ltr"><span style="font-family:Courier;font-size:12.8px">[Apologies for cross and multiple postings]</span><br style="font-family:Courier;font-size:12.8px"><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">******************************</span><span style="font-family:Courier;font-size:12.8px">******************************</span><span style="font-family:Courier;font-size:12.8px">**********</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">                              </span><span style="font-family:Courier;font-size:12.8px">     </span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">               2nd IEEE/IFIP International Workshop on</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">   Security for Emerging Distributed Network Technologies (DISSECT)</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">                              </span><span style="font-family:Courier;font-size:12.8px">     </span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">                   </span><a href="http://www.dissect.vcu.edu/2016/" target="_blank" style="font-family:Courier;font-size:12.8px">http://www.dissect.vcu.edu/2016/</a><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">                              </span><span style="font-family:Courier;font-size:12.8px">     </span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">                    In conjunction with IEEE/IFIP</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">       Network Operations and Management Symposium (NOMS 2016)</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">                              </span><span style="font-family:Courier;font-size:12.8px">     </span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">                 Istanbul // Turkey // </span><span class="" tabindex="0" style="font-family:Courier;font-size:12.8px">29 April 2016</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">                              </span><span style="font-family:Courier;font-size:12.8px">     </span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">           </span><b style="font-family:Courier;font-size:12.8px">SUBMISSION DEADLINE: <span class="" tabindex="0"><span class="">January 8th, 2016</span></span> (EXTENDED)</b><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">                              </span><span style="font-family:Courier;font-size:12.8px">     </span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">******************************</span><span style="font-family:Courier;font-size:12.8px">******************************</span><span style="font-family:Courier;font-size:12.8px">**********</span><br style="font-family:Courier;font-size:12.8px"><br style="font-family:Courier;font-size:12.8px"><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">The  emergence  of  networking  technologies and  paradigms,  such  as</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">software defined  networking and network function  virtualization, has</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">completely transformed  the way  networks are designed,  deployed, and</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">managed, and has brought a multitude of challenges to the spotlight of</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">worldwide  research. In this  context, security  has been  one of  the</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">areas of major concern and thus research interest, especially with the</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">growing demands  of the  general public  for secure,  trustworthy, and</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">privacy-preserving data communication and management.</span><br style="font-family:Courier;font-size:12.8px"><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">In its second edition,  the main goal of DISSECT will  be to put focus</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">on security issues and challenges  arising with the emergence of novel</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">networking technologies  and paradigms. The  workshop will  shed light</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">on  new  challenges  and  present  state-of-the-art  research  on  the</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">various  security aspects  of next-generation  networking technologies</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">and service management frameworks.</span><br style="font-family:Courier;font-size:12.8px"><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">DISSECT   will  offer   a  venue   for  bringing   together  students,</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">researchers,  and professionals  from  academia  and industry  sharing</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">common  interest on  security  challenges related  to  the design  and</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">management of the distributed networks and infrastructures. DISSECT is</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">intended to (1)  discussing these challenges as well  as future trends</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">on  security  management,  (2) present  and  discuss  work-in-progress</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">security-related  research  on   cutting-edge  technologies,  and  (3)</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">strengthening collaboration and research ties among peers.</span><br style="font-family:Courier;font-size:12.8px"><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">Topics of Interest:</span><br style="font-family:Courier;font-size:12.8px"><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">In this  workshop, the research  community from industry  and academia</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">will  be  invited to  contribute  with  manuscripts describing  novel,</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">work-in-progress  research  on the  design  of  solutions to  relevant</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">security  issues  on a  wide  variety  of next  generation  networking</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">technologies. The topics of interest of  the workshop include, but are</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">not limited to</span><br style="font-family:Courier;font-size:12.8px"><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Secure networking architecture design</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Intrusion detection and mitigation for emerging networks</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Trust and privacy in social networks</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Security and trust management in cloud environments</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Security challenges in the Internet of Things</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Secure design of SDN and NFV solutions</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Networked, distributed systems security</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Security and privacy of mobile systems</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Privacy-enhancing technologies</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Security measurement and analysis</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Wireless and ad-hoc network security</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Networks forensics</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Collaborative network security</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Security for smart X</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Security for large system and critical infrastructure</span><br style="font-family:Courier;font-size:12.8px"><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">Author Instructions:</span><br style="font-family:Courier;font-size:12.8px"><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">All submitted  papers must present original, unpublished  research  or</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">experiences. Papers under  review elsewhere  must not be  submitted to</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">the workshop. All  contributions  must be submitted in PDF  format via</span><br style="font-family:Courier;font-size:12.8px"><a href="http://jems.sbc.org.br/dissect2016" target="_blank" style="font-family:Courier;font-size:12.8px">http://jems.sbc.org.br/dissect2016</a><span style="font-family:Courier;font-size:12.8px"> </span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">Each paper  must  be limited  to  6  pages using  IEEE  2-column style</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">and will  be subject to a peer-review process. Accepted papers will be</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">published  in the IEEE Xplore Digital Library. Any paper not presented</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">in the workshop by one its authors will be withdrawn from IEEE Xplore.</span><br style="font-family:Courier;font-size:12.8px"><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">Important Dates:</span><br style="font-family:Courier;font-size:12.8px"><br style="font-family:Courier;font-size:12.8px"><b style="font-family:Courier;font-size:12.8px">- <span class="" tabindex="0"><span class="">8th Jan 2016</span></span>: Paper Submission Deadline (EXTENDED)<br></b><span style="font-family:Courier;font-size:12.8px">- </span><span class="" tabindex="0" style="font-family:Courier;font-size:12.8px">30th Jan 2016</span><span style="font-family:Courier;font-size:12.8px">: Acceptance Notification</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- </span><span class="" tabindex="0" style="font-family:Courier;font-size:12.8px">15th Feb 2016</span><span style="font-family:Courier;font-size:12.8px">: Camera-Ready Papers</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- </span><span class="" tabindex="0" style="font-family:Courier;font-size:12.8px">29th April 2016</span><span style="font-family:Courier;font-size:12.8px">: Workshop Day</span><br style="font-family:Courier;font-size:12.8px"><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">Workshop Co-Chairs:</span><br style="font-family:Courier;font-size:12.8px"><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Carol Fung, Virginia Commonwealth University, USA</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- Mohamed Faten Zhani, École de Technologie Supérieure, Canada</span><br style="font-family:Courier;font-size:12.8px"><span style="font-family:Courier;font-size:12.8px">- </span><span class="" style="font-family:Courier;font-size:12.8px">Weverton</span><span style="font-family:Courier;font-size:12.8px"> Cordeiro, Federal University of Rio Grande do Sul, Brazil</span><div class="gmail_signature"><div dir="ltr"></div></div><div><span style="font-family:Courier;font-size:12.8px"><br></span></div></div>